로그를 설명 좀 해주세요 .. 아무래도 좀 이상합니다.
/var/logs 에 있는 .messages에서 뽑은 겁니다. 너무 많아서
Mar 20 21:56:10 www smartd[3136]: Device: /dev/sda, Temperature changed 2 Celsius to 30 Celsius since last report
Mar 20 21:58:20 www sshd(pam_unix)[29517]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:24 www sshd(pam_unix)[29519]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:28 www sshd(pam_unix)[29521]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:33 www sshd(pam_unix)[29523]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:37 www sshd(pam_unix)[29525]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:42 www sshd(pam_unix)[29527]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:47 www sshd(pam_unix)[29529]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 20 21:58:51 www sshd(pam_unix)[29531]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.29.74 user=root
Mar 21 12:59:06 www sshd(pam_unix)[30321]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=nobody
Mar 21 12:59:08 www named[1257]: lame server resolving 'ns2.pacific.net.in' (in 'pacific.net.in'?): 203.123.176.65#53
Mar 21 12:59:12 www unix_chkpwd[30325]: check pass; user unknown
Mar 21 12:59:12 www sshd(pam_unix)[30323]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:16 www unix_chkpwd[30328]: check pass; user unknown
Mar 21 12:59:16 www sshd(pam_unix)[30326]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:19 www sshd(pam_unix)[30329]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 12:59:24 www sshd(pam_unix)[30331]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 12:59:28 www sshd(pam_unix)[30333]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 12:59:32 www sshd(pam_unix)[30335]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 12:59:36 www sshd(pam_unix)[30337]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 12:59:40 www unix_chkpwd[30341]: check pass; user unknown
Mar 21 12:59:40 www sshd(pam_unix)[30339]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:45 www unix_chkpwd[30344]: check pass; user unknown
Mar 21 12:59:45 www sshd(pam_unix)[30342]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:50 www unix_chkpwd[30347]: check pass; user unknown
Mar 21 12:59:50 www sshd(pam_unix)[30345]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:54 www unix_chkpwd[30350]: check pass; user unknown
Mar 21 12:59:54 www sshd(pam_unix)[30348]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 12:59:58 www unix_chkpwd[30353]: check pass; user unknown
Mar 21 12:59:58 www sshd(pam_unix)[30351]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:02 www unix_chkpwd[30356]: check pass; user unknown
Mar 21 13:00:02 www sshd(pam_unix)[30354]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:05 www unix_chkpwd[30359]: check pass; user unknown
Mar 21 13:00:05 www sshd(pam_unix)[30357]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:09 www unix_chkpwd[30362]: check pass; user unknown
Mar 21 13:00:09 www sshd(pam_unix)[30360]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:14 www unix_chkpwd[30365]: check pass; user unknown
Mar 21 13:00:14 www sshd(pam_unix)[30363]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:18 www unix_chkpwd[30368]: check pass; user unknown
Mar 21 13:00:18 www sshd(pam_unix)[30366]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:22 www unix_chkpwd[30371]: check pass; user unknown
Mar 21 13:00:22 www sshd(pam_unix)[30369]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:26 www unix_chkpwd[30374]: check pass; user unknown
Mar 21 13:00:26 www sshd(pam_unix)[30372]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:30 www unix_chkpwd[30377]: check pass; user unknown
Mar 21 13:00:30 www sshd(pam_unix)[30375]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:35 www sshd(pam_unix)[30378]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=operator
Mar 21 13:00:38 www sshd(pam_unix)[30380]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=adm
Mar 21 13:00:43 www sshd(pam_unix)[30382]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=apache
Mar 21 13:00:47 www unix_chkpwd[30386]: check pass; user unknown
Mar 21 13:00:47 www sshd(pam_unix)[30384]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:50 www unix_chkpwd[30389]: check pass; user unknown
Mar 21 13:00:50 www sshd(pam_unix)[30387]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:00:55 www sshd(pam_unix)[30390]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=adm
Mar 21 13:00:59 www sshd(pam_unix)[30392]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:01 www crond(pam_unix)[30394]: session opened for user root by (uid=0)
Mar 21 13:01:01 www crond(pam_unix)[30394]: session closed for user root
Mar 21 13:01:03 www sshd(pam_unix)[30396]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:07 www sshd(pam_unix)[30398]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:11 www unix_chkpwd[30402]: check pass; user unknown
Mar 21 13:01:11 www sshd(pam_unix)[30400]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:01:15 www unix_chkpwd[30405]: check pass; user unknown
Mar 21 13:01:15 www sshd(pam_unix)[30403]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:01:19 www sshd(pam_unix)[30406]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:23 www sshd(pam_unix)[30408]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:27 www sshd(pam_unix)[30411]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:30 www sshd(pam_unix)[30413]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:34 www sshd(pam_unix)[30415]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:38 www unix_chkpwd[30419]: check pass; user unknown
Mar 21 13:01:38 www sshd(pam_unix)[30417]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:01:42 www sshd(pam_unix)[30420]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:46 www sshd(pam_unix)[30422]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:50 www sshd(pam_unix)[30424]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:54 www sshd(pam_unix)[30426]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:01:58 www sshd(pam_unix)[30428]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:02 www sshd(pam_unix)[30430]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:06 www sshd(pam_unix)[30432]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:09 www sshd(pam_unix)[30434]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:14 www sshd(pam_unix)[30436]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:17 www sshd(pam_unix)[30438]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:21 www sshd(pam_unix)[30440]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:25 www sshd(pam_unix)[30442]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:29 www sshd(pam_unix)[30444]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:33 www sshd(pam_unix)[30446]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:37 www sshd(pam_unix)[30448]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:41 www sshd(pam_unix)[30450]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:44 www sshd(pam_unix)[30452]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:49 www sshd(pam_unix)[30454]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:53 www sshd(pam_unix)[30456]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:02:56 www sshd(pam_unix)[30458]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:00 www sshd(pam_unix)[30460]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:04 www sshd(pam_unix)[30462]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:08 www sshd(pam_unix)[30464]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:12 www sshd(pam_unix)[30466]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:20 www sshd(pam_unix)[30468]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:25 www sshd(pam_unix)[30470]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:28 www sshd(pam_unix)[30472]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:32 www sshd(pam_unix)[30474]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:36 www sshd(pam_unix)[30476]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:40 www sshd(pam_unix)[30478]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:44 www sshd(pam_unix)[30480]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:48 www sshd(pam_unix)[30482]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:53 www sshd(pam_unix)[30484]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:03:56 www sshd(pam_unix)[30486]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:04 www sshd(pam_unix)[30488]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:08 www sshd(pam_unix)[30490]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:13 www unix_chkpwd[30494]: check pass; user unknown
Mar 21 13:04:13 www sshd(pam_unix)[30492]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:04:17 www unix_chkpwd[30497]: check pass; user unknown
Mar 21 13:04:17 www sshd(pam_unix)[30495]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:04:20 www sshd(pam_unix)[30498]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:25 www unix_chkpwd[30502]: check pass; user unknown
Mar 21 13:04:25 www sshd(pam_unix)[30500]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:04:29 www sshd(pam_unix)[30503]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:33 www sshd(pam_unix)[30505]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:37 www sshd(pam_unix)[30507]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:41 www sshd(pam_unix)[30509]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:04:49 www unix_chkpwd[30513]: check pass; user unknown
Mar 21 13:04:49 www sshd(pam_unix)[30511]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:04:53 www unix_chkpwd[30516]: check pass; user unknown
Mar 21 13:04:53 www sshd(pam_unix)[30514]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:04:57 www unix_chkpwd[30519]: check pass; user unknown
Mar 21 13:04:57 www sshd(pam_unix)[30517]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:01 www unix_chkpwd[30522]: check pass; user unknown
Mar 21 13:05:01 www sshd(pam_unix)[30520]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:05 www unix_chkpwd[30525]: check pass; user unknown
Mar 21 13:05:05 www sshd(pam_unix)[30523]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:09 www unix_chkpwd[30528]: check pass; user unknown
Mar 21 13:05:09 www sshd(pam_unix)[30526]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:13 www unix_chkpwd[30531]: check pass; user unknown
Mar 21 13:05:13 www sshd(pam_unix)[30529]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:18 www unix_chkpwd[30534]: check pass; user unknown
Mar 21 13:05:18 www sshd(pam_unix)[30532]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:21 www unix_chkpwd[30537]: check pass; user unknown
Mar 21 13:05:21 www sshd(pam_unix)[30535]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:25 www unix_chkpwd[30541]: check pass; user unknown
Mar 21 13:05:25 www sshd(pam_unix)[30538]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:30 www unix_chkpwd[30544]: check pass; user unknown
Mar 21 13:05:30 www sshd(pam_unix)[30542]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:34 www unix_chkpwd[30547]: check pass; user unknown
Mar 21 13:05:34 www sshd(pam_unix)[30545]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:38 www unix_chkpwd[30550]: check pass; user unknown
Mar 21 13:05:38 www sshd(pam_unix)[30548]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:42 www unix_chkpwd[30553]: check pass; user unknown
Mar 21 13:05:42 www sshd(pam_unix)[30551]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:46 www unix_chkpwd[30556]: check pass; user unknown
Mar 21 13:05:46 www sshd(pam_unix)[30554]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:51 www unix_chkpwd[30559]: check pass; user unknown
Mar 21 13:05:51 www sshd(pam_unix)[30557]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:54 www unix_chkpwd[30562]: check pass; user unknown
Mar 21 13:05:54 www sshd(pam_unix)[30560]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:05:56 www named[1257]: client 218.38.12.105#59629: updating zone 'kkk.com/IN': update failed: 'name in use' prerequisite not satisfied (NXDOMAIN)
Mar 21 13:05:57 www named[1257]: client 218.38.12.105#59630: updating zone 'kkk.com/IN': update failed: 'name in use' prerequisite not satisfied (NXDOMAIN)
Mar 21 13:05:58 www unix_chkpwd[30565]: check pass; user unknown
Mar 21 13:05:58 www sshd(pam_unix)[30563]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:06:02 www unix_chkpwd[30568]: check pass; user unknown
Mar 21 13:06:02 www sshd(pam_unix)[30566]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35
Mar 21 13:06:06 www sshd(pam_unix)[30569]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 13:06:15 www sshd(pam_unix)[30573]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.123.190.35 user=root
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/dm_db-backup.tar dev=dm-0 ino=1097744 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/dm_db-backup.tar dev=dm-0 ino=1097744 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/html_bak.tar.gz dev=dm-0 ino=1097770 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/html_bak.tar.gz dev=dm-0 ino=1097770 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050316.sql dev=dm-0 ino=1097746 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050316.sql dev=dm-0 ino=1097746 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050317.sql dev=dm-0 ino=1097776 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050317.sql dev=dm-0 ino=1097776 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050318.sql dev=dm-0 ino=1097778 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050318.sql dev=dm-0 ino=1097778 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050319.sql dev=dm-0 ino=1097780 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050319.sql dev=dm-0 ino=1097780 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050320.sql dev=dm-0 ino=1097782 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050320.sql dev=dm-0 ino=1097782 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050321.sql dev=dm-0 ino=1097784 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/mysql_db_bak_20050321.sql dev=dm-0 ino=1097784 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.446:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050316.sql dev=dm-0 ino=1097766 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050316.sql dev=dm-0 ino=1097766 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050317.sql dev=dm-0 ino=1097777 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050317.sql dev=dm-0 ino=1097777 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050318.sql dev=dm-0 ino=1097779 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050318.sql dev=dm-0 ino=1097779 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050319.sql dev=dm-0 ino=1097781 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050319.sql dev=dm-0 ino=1097781 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050320.sql dev=dm-0 ino=1097783 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050320.sql dev=dm-0 ino=1097783 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050321.sql dev=dm-0 ino=1097785 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.447:0): avc: denied { getattr } for pid=30618 exe=/bin/chmod path=/backup/zboard_db_bak_20050321.sql dev=dm-0 ino=1097785 scontext=root:system_r:httpd_sys_script_t tcontext=root:object_r:root_t tclass=file
Mar 21 17:20:01 www kernel: audit(1111393201.450:0): avc: denied { dac_override } for pid=30620 exe=/bin/tar capability=1 scontext=root:system_r:httpd_sys_script_t tcontext=root:system_r:httpd_sys_script_t tclass=capability
Mar 23 00:23:19 www kernel: device eth0 entered promiscuous mode
Mar 23 00:23:19 www kernel: device eth0 left promiscuous mode
Mar 23 23:28:39 www sshd(pam_unix)[5377]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw
Mar 23 23:28:44 www unix_chkpwd[5382]: check pass; user unknown
Mar 23 23:28:44 www sshd(pam_unix)[5380]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw
Mar 23 23:28:48 www unix_chkpwd[5385]: check pass; user unknown
Mar 23 23:28:48 www sshd(pam_unix)[5383]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw
Mar 23 23:28:52 www unix_chkpwd[5388]: check pass; user unknown
Mar 23 23:28:52 www sshd(pam_unix)[5386]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw
Mar 23 23:28:56 www unix_chkpwd[5391]: check pass; user unknown
Mar 23 23:28:56 www sshd(pam_unix)[5389]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw
Mar 23 23:29:00 www sshd(pam_unix)[5392]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw user=root
Mar 23 23:29:04 www sshd(pam_unix)[5394]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw user=root
Mar 23 23:29:12 www sshd(pam_unix)[5396]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=k7.asian-east.com.tw user=root
Mar 24 00:26:10 www smartd[3136]: Device: /dev/sda, Temperature changed 2 Celsius to 30 Celsius since last report
Mar 24 03:56:11 www smartd[3136]: Device: /dev/sda, Temperature changed -2 Celsius to 28 Celsius since last report
Mar 24 04:02:03 www named[1257]: lame server resolving 'nis.dacom.co.kr' (in 'dacom.co.kr'?): 211.216.50.150#53
Mar 24 04:02:03 www named[1257]: lame server resolving 'nis.dacom.co.kr' (in 'dacom.co.kr'?): 211.216.50.150#53
Mar 24 04:02:03 www named[1257]: lame server resolving 'ns2.dacom.co.kr' (in 'dacom.co.kr'?): 211.216.50.150#53
Mar 24 10:57:51 www unix_chkpwd[5883]: check pass; user unknown
Mar 24 10:57:51 www vsftpd(pam_unix)[5881]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=24.42.43.94
Mar 24 16:47:16 www vsftpd(pam_unix)[6349]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=61.183.16.222
Mar 25 21:10:52 www sshd(pam_unix)[8092]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.152.37.12 user=root
Mar 25 21:11:01 www sshd(pam_unix)[8094]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.152.37.12 user=root
이게 침입시도인가요?
침입시도 맞습니다. iptables 로 막든지.. route 로 막든지
침입시도 맞습니다. iptables 로 막든지.. route 로 막든지 하세요.
저는 대충 이쯤 막아둡니다.
---------
귓가에 햇살을 받으며 석양까지 행복한 여행을...
웃으며 떠나갔던 것처럼 미소를 띠고 돌아와 마침내 평안하기를...
- 엘프의 인사, 드래곤 라자, 이영도
즐겁게 놀아보자.
warpdory님 그렇게 막으면 부득이 하게 다른 사용자까지 피해가
warpdory님 그렇게 막으면
부득이 하게 다른 사용자까지 피해가 가지 않나요?
궁금..
Chaos to Cosmos,
Chaos to Chaos,
Cosmos to Cosmos,
Cosmos to Chaos.
[quote="ctcquatre"]warpdory님 그렇게 막으면 부
같은 대역에 있음을 탓해야죠 뭐.
몇몇 사용자에게 욕 먹고 말지 서버 날려먹고 욕 먹긴 싫거든요.
사실 핑계 거리야 무궁무진합니다. '컴퓨터에 웜바이러스나 스파이웨어가 걸려서 접속이 안될 수 있다.' 부터 시작해서 말이죠.
---------
귓가에 햇살을 받으며 석양까지 행복한 여행을...
웃으며 떠나갔던 것처럼 미소를 띠고 돌아와 마침내 평안하기를...
- 엘프의 인사, 드래곤 라자, 이영도
즐겁게 놀아보자.
무작위로 스캔해서 시도하는 것이라면 정규포트가 아닌다른 포트로 바꿔버
무작위로 스캔해서 시도하는 것이라면 정규포트가 아닌
다른 포트로 바꿔버려도 됩니다.
Written By the Black Knight of Destruction
음, root 접근 막아두세요그나마 안전할겁니다. ro
음, root 접근 막아두세요
그나마 안전할겁니다.
root 필요하실땐 "su -" 를 날려주세요
http://kkanari.egloos.com/
음...그냥 tcpwarpper를 쓰고 Portsentry를 설치해서
음...
그냥 tcpwarpper를 쓰고 Portsentry를 설치해서 동적으로 침입하고자하는
IP에 대해 블럭을 해주면 될듯한데..ㅡㅡ;;
그럼 특정 아이피대역 모두를 막을 필요도 없고...
헤이함은
큰 사고의 씨앗이다.
댓글 달기